diff options
author | Felix Fietkau <nbd@nbd.name> | 2023-08-31 13:02:00 +0200 |
---|---|---|
committer | Felix Fietkau <nbd@nbd.name> | 2023-09-18 16:52:25 +0200 |
commit | 6e09f88d29171f2ddd74cb5e70653dbe58f10af6 (patch) | |
tree | 81336bc632603fc0e54b74478cbbdbc7306f57af /toolchain | |
parent | 6798f156f910b227abf21b683ab3723663a9de02 (diff) | |
download | upstream-6e09f88d29171f2ddd74cb5e70653dbe58f10af6.tar.gz upstream-6e09f88d29171f2ddd74cb5e70653dbe58f10af6.tar.bz2 upstream-6e09f88d29171f2ddd74cb5e70653dbe58f10af6.zip |
netifd: update to the latest version
db3934d2f740 scripts/netifd-wireless.sh: properly fix WPA3 Enterprise support
Support the following values for the different WPA3 Enterprise modes:
- wpa3-mixed: WPA3 Enterprise transitional mode
This supports EAP with both SHA1 and SHA-256, with optional MFP
- wpa3: WPA3 Enterprise only mode
This supports only SHA256 with mandatory MFP
- wpa3-192: WPA3 Enterprise with mandatory 192 bit support
This uses only GCMP-256 ciphers
Disable 192 bit support and GCMP-256 ciphers for the regular "wpa3" mode.
It seems that even leaving in optional 192 bit support breaks auth on some
clients, including iOS devices.
Signed-off-by: Felix Fietkau <nbd@nbd.name>
(cherry picked from commit 8c03dc962f8e10f9fef0877a0f8d8235f619ef7d)
Diffstat (limited to 'toolchain')
0 files changed, 0 insertions, 0 deletions